Steven Noel
Steven Noel
Cybersecurity Researcher, The MITRE Corporation
Dirección de correo verificada de mitre.org - Página principal
Título
Citado por
Citado por
Año
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’Berry
Managing Cyber Threats: Issues, Approaches and Challenges, 247-266, 2005
5322005
Efficient minimum-cost network hardening via exploit dependency graphs
S Noel, S Jajodia, B O'Berry, M Jacobs
19th Annual Computer Security Applications Conference, 2003. Proceedings., 86-95, 2003
3402003
Managing Attack Graph Complexity Through Visual Hierarchical Aggregation
S Noel, S Jajodia
Proceedings of the ACM Workshop on Visualization and Data Mining for …, 2004
3042004
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
2972006
Correlating intrusion events and building attack scenarios through attack graph distances
S Noel, E Robertson, S Jajodia
20th Annual Computer Security Applications Conference, 350-359, 2004
1992004
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2013
1422013
Understanding complex network attack graphs through clustered adjacency matrices
S Noel, S Jajodia
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-169, 2005
1422005
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1362010
Multiple coordinated views for network attack graphs
S Noel, M Jacobs, P Kalapa, S Jajodia
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 99-106, 2005
1362005
Representing TCP/IP connectivity for topological analysis of network security
R Ritchey, B O'Berry, S Noel
18th Annual Computer Security Applications Conference, 2002. Proceedings., 25-31, 2002
1272002
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
1262002
Cauldron mission-centric cyber situational awareness with defense in depth
S Jajodia, S Noel, P Kalapa, M Albanese, J Williams
2011-MILCOM 2011 Military Communications Conference, 1339-1344, 2011
1232011
Time-efficient and cost-effective network hardening using attack graphs
M Albanese, S Jajodia, S Noel
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
1182012
Topological vulnerability analysis
S Jajodia, S Noel
Cyber situational awareness, 139-154, 2010
1012010
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
European Symposium on Research in Computer Security, 573-587, 2010
982010
Optimal ids sensor placement and alert prioritization using attack graphs
S Noel, S Jajodia
Journal of Network and Systems Management 16 (3), 259-275, 2008
972008
Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
S Jajodia, S Noel
Algorithms, architectures and information systems security, 285-305, 2009
802009
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
722009
Recent results in wavelet applications
I Daubechies
Journal of Electronic Imaging 7 (4), 1998
661998
Metrics suite for network attack graph analytics
S Noel, S Jajodia
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
602014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20